Sciweavers

1580 search results - page 242 / 316
» Modules for Crosscutting Models
Sort
View
INDOCRYPT
2004
Springer
15 years 8 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
114
Voted
IWPC
2003
IEEE
15 years 8 months ago
Design Recovery of a Two Level System
Many applications have one or more important modules that are written in a language other than conventional procedural or object oriented languages. These languages are often tran...
Thomas R. Dean, Yuling Chen
146
Voted
KBSE
2002
IEEE
15 years 7 months ago
Generating Product-Lines of Product-Families
GenVoca is a methodology and technology for generating product-lines, i.e. building variants of a program. The primitive components from which applications are constructed are ref...
Don S. Batory, Roberto E. Lopez-Herrejon, Jean-Phi...
142
Voted
GECCO
2010
Springer
152views Optimization» more  GECCO 2010»
15 years 7 months ago
Importing the computational neuroscience toolbox into neuro-evolution-application to basal ganglia
Neuro-evolution and computational neuroscience are two scientific domains that produce surprisingly different artificial neural networks. Inspired by the “toolbox” used by ...
Jean-Baptiste Mouret, Stéphane Doncieux, Be...
MM
1999
ACM
120views Multimedia» more  MM 1999»
15 years 7 months ago
An RTP-based synchronized hypermedia live lecture system for distance education
In this article, we have introduced a “Live Synchronized Hypermedia Live Lecture (SHLL) System” using RTP to synchronize the live presentation of streaming video lecture, HTML...
Herng-Yow Chen, Yen-Tsung Chia, Gin-Yi Chen, Jen-S...